The search functionality is under construction.

Author Search Result

[Author] Jun MURAI(27hit)

1-20hit(27hit)

  • MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    Hajime TAZAKI  Rodney Van METER  Ryuji WAKIKAWA  Thirapon WONGSAARDSAKUL  Kanchana KANCHANASUT  Marcelo DIAS DE AMORIM  Jun MURAI  

     
    PAPER

      Vol:
    E93-B No:8
      Page(s):
    2004-2011

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  • Architecture for IP Multicast Deployment: Challenges and Practice Open Access

    Hitoshi ASAEDA  Shinsuke SUZUKI  Katsushi KOBAYASHI  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E89-B No:4
      Page(s):
    1044-1051

    IP multicast technology is highly advantageous for various applications and future needs in the Internet. Yet, it is generally recognized that the IP multicast routing protocol is fairly complex and non-scalable and requires additional maintenance and operational cost to network administrators. Although there has been much research related to IP multicast and most router vendors already support basic IP multicast routing protocols, there is still a big gap between what is reported as the state-of-the-art in the literature from what is implemented in practice. In this paper, we clarify the complexities of traditional multicast communication and describe possible solutions using the one-to-many multicast communication model called Source-Specific Multicast (SSM). We explain this communication model and the corresponding routing architecture and examine the statistics obtained for the number of multicast routing entries in our backbone router, which is connected to the international backbone. We also introduce our international collaboration activities that are contributing to the deployment and promotion of IP multicast services in the Internet.

  • Permissible Link Quality for RFID Anti-Collision in a Practical Environment

    Yuusuke KAWAKITA  Osamu NAKAMURA  Jun MURAI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1480-1489

    UHF radio frequency identification (RFID) has gathered significant interest in the field of long-distance automatic identification applications. Since UHF RFID shares the frequency band with other RFID and/or other wireless systems, it is important to determine how much interference can be applied without causing a significant degradation of anti-collision speed. In this paper, the permissible link quality for RFID anti-collision in a practical environment is discussed by considering an erroneous communication link, taking into account of bit encoding and the type of interference. We approach the quantification of permissible link quality experimentally along with protocol simulations and the mathematical analyses. An international standard protocol, employing frame slotted ALOHA, was used as the air protocol. For these investigations, the present authors developed a protocol simulator. The simulation results were compared with analytical values based on Poisson distribution. The investigation in the return (tag to reader) link, and the forward (reader to tag) link, were analyzed separately. As result of the protocol simulation, it is generally important to secure the Pulse Error Rate 10-4 or better in both return and forward links for the anti-collision of 64 or less tags. The quality of the return link may be relaxed when the application does not require fast anti-collision. The degradation of the forward link, on the other hand, may entail loss of important commands, resulting in extremely slow anti-collision. It is measured experimentally that the required link quality can be relaxed by up to 10 dB in the return links and by 5 dB in the forward link when the primary source of interference originates in the interfering readers.

  • Distributed Mobility Management Scheme for Mobile IPv6

    Ryuji WAKIKAWA  Guillaume VALADON  Noriyuki SHIGECHIKA  Jun MURAI  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    77-84

    Mobile IPv6 and Network Mobility (NEMO) have been standardized as IP extensions. While these technologies are planned to be adopted by several communities, such as the vehicle, aviation, and cellular industries, Mobile IPv6 has serious deployment issues such as scalability, protocol resilience, and redundancy. In these technologies, a special router called a home agent is introduced to support the movement of mobile nodes. This home agent introduces overlapping, inefficient routes, and becomes a single point of failure and a performance bottleneck. In this paper, a new concept for scalable and dependable mobility management scheme is proposed. Multiple home agents serve the same set of mobile nodes. The Home Agent Reliability protocol and Home Agent migration are introduced to achieve this concept. We also propose an overlay network named a Global Mobile eXchange (GMX) that efficiently handles data traffic from and to mobile nodes, and operates home agents as would an Internet eXchange Point (IXP).

  • Routing Optimization for Nested Mobile Networks

    Masafumi WATARI  Thierry ERNST  Ryuji WAKIKAWA  Jun MURAI  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2786-2793

    Network Mobility (NEMO) Basic Support is the standard protocol to provide continuous network connectivity and movement transparency to a group of nodes moving together, as in a vehicle. However, the protocol suffers from sub-optimal routing and packet overhead caused by a bi-directional tunnel between the Mobile Router (MR) connecting the mobile network to the Internet and its Home Agent (HA). When a nested NEMO is formed, these inefficiencies become intolerable for real-time multimedia applications. To optimize the delivery of these packets, this study proposes Optimized NEMO (ONEMO) that is capable of providing an optimal path with minimum packet overhead in various scenarios with nested mobility. The protocol is designed to offer the path with minimum signaling overhead and functional requirements are limited to its MRs. Evaluation through measurements against NEMO Basic Support and comparison among other solutions showed effectiveness of the protocol.

  • Operation of a Root DNS Server

    Akira KATO  Jun MURAI  

     
    INVITED PAPER-Internet Operation

      Vol:
    E84-B No:8
      Page(s):
    2033-2038

    The authors have been in charge of the operation of one of the root DNS servers for more than three years. In this paper, the overview of our system to provide high availability is introduced. In the following sections, a traffic analysis system to analyze the characteristics of the DNS queries and the brief summary which may help future DNS system deployment is described.

  • Drouting Architecture: Improvement of Failure Avoidance Capability Using Multipath Routing

    Yasuhiro OHARA  Hiroyuki KUSUMOTO  Osamu NAKAMURA  Jun MURAI  

     
    PAPER-Network

      Vol:
    E91-B No:5
      Page(s):
    1403-1415

    Failure avoidance capability is a desired feature for telecommunication networks, such as the Internet. However, not all failures can be promptly bypassed on the Internet because routing systems that are responsible for detecting and avoiding failures cannot detect all failures. Consequently, failures can interrupt internet communications for a long time, such as a few hours. This paper proposes a novel routing architecture called Drouting that enables flexible failure avoidance. In Drouting, routers calculate multipaths from a source to a destination by constructing Directed Acyclic Graphs (DAGs) that include all links in the intra-domain network graph. IP packets carry packet tags that are set by the end host. The packet tags are used to select a network path from the multipath routes. In this paper, the failure avoidance property of Drouting architecture is evaluated through comparison with another proposal, Deflection, using simulations. Simulations were performed on inferred and synthetic topologies. Drouting exhibits similar performance with Deflection in terms of the number of nexthops, the number of paths and the length of paths, while Drouting outperforms Deflection in the probability of success of failure avoidance.

  • Congestion Control Mechanism for TCP with Packet Pair Scheme

    Yoshifumi NISHIDA  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E82-D No:4
      Page(s):
    854-862

    Congestion Control Scheme of TCP/IP protocol suite is established by Transmission Control Protocol (TCP). Using the self-clocking scheme, TCP is able to maintain a quick optimum connection status for the network path, unless it is given an excessive load to carry to the network. However, in wide area networks, there are some obstructive factors for the self-clocking scheme of TCP. In this paper, we describe the obstructive factors for the self-clocking scheme. We propose a new congestion control scheme using a packet pair scheme and a traffic-shaping scheme. In combining these schemes with TCP, new TCP options and a modification for TCP congestion control algorithms are added. Using our scheme, TCP is able to maintain smooth self-clocking. We implemented this scheme on a network simulator for evaluation. Compared with normal TCP, this scheme was demonstrated to be over 20% more efficient in symmetric communication and over 40% more efficient in asymmetric communication.

  • IPv4 Traversal for the NEMO Basic Support Protocol by IPv4 Care-of Address Registration

    Ryuji WAKIKAWA  Carl WILLIAMS  Keisuke UEHARA  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E88-B No:4
      Page(s):
    1331-1337

    On the Internet, two different IP protocols are deployed such as IPv4 and IPv6. The Mobile Router uses the basic NEMO protocol which is IPv6 protocol specific. During the early period of time that IPv6 transition is occurring it is very likely that a Mobile Router will move to an IPv4 only access network. When this occurs the Mobile Router will no longer be able to operate using the basic NEMO protocol. There has already been some earlier work to provide IPv6 capability over an IPv4 access network for a Mobile Router. This paper provides a capability by to maintain IPv6 connectivity for the Mobile Router via its Home Agent with IPv4-in-IPv6 encapsulation with no special boxes to be deployed elsewhere in the network.

  • Reduction Over Time to Facilitate Peer-to-Peer Barter Relationships

    Kenji SAITO  Eiichi MORINO  Jun MURAI  

     
    PAPER-Peer-to-Peer Network

      Vol:
    E89-D No:1
      Page(s):
    181-188

    A peer-to-peer complementary currency can be a powerful tool for promoting exchanges and building relationships on the Internet. iWAT [1] is a proposed such currency based on the WAT System [2], a polycentric complementary currency using WAT tickets as its media of exchange: participants spontaneously issue and circulate the tickets as needed, whose values are backed up by chains of trust. iWAT implements the tickets electronically by exchanging messages signed in OpenPGP [3]. This paper investigates an extension to the design of iWAT to facilitate mutual help among peers in need. In particular, we investigate additional "reduction" tickets whose values are reduced over time. By deferring redemption of such tickets, the participants can contribute to reduce the debts of the issuers, and the issuers help participants by providing exchange media that accelerate spending. This paper describes in detail how incentive-compatibility is achieved by this extended design; we predict that the following properties will hold, which resulted from a game-theoretical analysis.1. Rapid circulation, or a reduction ticket will typically circulate at high speed until its effective value reaches the scheduled minimum, and2. Vanishment equilibrium, or the system will be most stable if the values of tickets are to be reduced down to zero. A reference implementation of iWAT has been developed in the form of a plug-in for an XMPP [4],[5] instant messaging client. We have been putting the currency system into practical use, to which the proposed feature has been added.

  • Large-Scale Cooperative Dissemination of Governmental Information in Emergency – An Experiment and Future Strategies Open Access

    Katsuhiro HORIBA  Keiko OKAWA  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E95-B No:7
      Page(s):
    2191-2199

    On the 11th of March, 2011, a massive earthquake hit the northeast region of Japan. The government of Japan needed to publish information regarding the earthquake and its influences. However, their capacity of Web services overflowed. They called the industry and academia for help for providing stable information service to the people. Industry and academia formed a team to answer the call and named themselves the “EQ project”. This paper describes how the EQ Project was organized and operated, and gives analyses of the statistics. An academic organization took the lead in the EQ Project. Ten organizations which consisted of commercial IT industry and academics specialized in Internet technology, were participating in the EQ Project and they structured the three clusters based on their relationships and technological approach. In WIDE Cluster, one of three clusters in the structure of EQ, the peak number of file accesses per day was over 90 thousand, the mobile browsers was 3.4% and foreign languages (translated contents) were referred 35%. We have also discussed the future information distribution strategies in emergency situation based on the experiences of the EQ Project, and proposed nine suggestions to the MEXT as a future strategy.

  • The Mechanism for Scalable Registry System with Aggregatable Address Allocation on WIDE 6bone

    Yuji SEKIYA  Hiromi WAKAI  Shu NAKAMAE  Kenji HIROSE  Jun MURAI  

     
    PAPER

      Vol:
    E82-D No:4
      Page(s):
    888-895

    The change over from IPv4 to IPv6 entails a potential increase in the number of records that the Registry System must maintain. Currently, only a few Network Information Centers (NICs), controlled by Internet Assigned Number Authority (IANA), operate their Registry Systems. As they concentrates data into several Registry System, it is not scalable. This paper focuses on the scalability issue in a Registry System and Mie Advanced Registry System (MARS) is proposed. Through the collaboration of independent Registry Systems, MARS ensures data consistency as well as making it possible to access data managed by other Registry Systems. A prototype system of MARS is implemented, maintained and managed on the WIDE 6bone. Some lessen from the operation of MARS give also described.

  • Design and Deployment of Post-Disaster Recovery Internet in 2011 Tohoku Earthquake

    Kotaro KATAOKA  Keisuke UEHARA  Masafumi OE  Jun MURAI  

     
    PAPER

      Vol:
    E95-B No:7
      Page(s):
    2200-2209

    In disaster sites of 2011 Tohoku Earthquake, digital communication was virtually unavailable due to the serious damage to the existing Internet and ICT resources. Thus there were urgent demands for recovering the Internet connectivity and first aid communication tools. This paper describes the design and deployment of networking systems that provide Internet connectivity using 3G mobile links or VSAT satellite links. In this paper we examine two approaches for post-disaster networking: quickly deployable package and on-demand networking. Based on a comparison of their characteristics and deployment experiences, this paper tries to extract lessons that contribute to improving the preparedness to another disaster. This paper also shares our significant operational experience acquired through supporting a maximum of 54 sites in Tohoku area including evacuation shelters, temporary hospitals and local government offices.

  • Linux IPv6 Stack Implementation Based on Serialized Data State Processing

    Hideaki YOSHIFUJI  Kazunori MIYAZAWA  Masahide NAKAMURA  Yuji SEKIYA  Hiroshi ESAKI  Jun MURAI  

     
    PAPER-Implementation and Operation

      Vol:
    E87-B No:3
      Page(s):
    429-436

    IPv6 is realized as the next generation internet platform, succeeding the current IPv4 internet environment. Linux, one of the major operating systems, has supported IPv6 since 1996, however, the quality of the protocol stack has not been good enough for professional operation. In this paper, we show our IPv6 stack implementation design regarding the neighbor management in Neighbor Discovery Protocol (NDP), the routing table management and the packet processing using XFRM architecture. The implementation is designed based on the Serialized Data State Processing, which aims at simpler object management so as to achieve stable, flexible and extensible IPv6 stack. According to the TAHI IPv6 Protocol Conformance Test Suite, we can show our implementation achieves enough implementation quality.

  • Otedama: A Relocatable RFID Information Repository Architecture

    Shigeya SUZUKI  Rodney VAN METER  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2922-2931

    We present a novel RFID middleware architecture, Otedama, which makes use of a unique property of RFID information to improve performance. RFID tags are bound to items. New information related to an RFID tag is generated at the site where the ID exists, and the entity most interested in the history and the item itself is in close proximity to the RFID tag. To exploit this property, we propose a scheme which bundles information related to a specific ID into one object and moves that bundle to a nearby server as the RFID tag moves from place to place. By using this scheme, information is always accessible by querying a system near the physical location of the tag, providing better query performance. Additionally, the volume of records that must be kept by a repository manager is reduced, because the relocation naturally migrates data away as physical objects move. We show the effectiveness of this architecture by analyzing data from a major retailer, finding that information retrieval performance will be six times better, and the cost of search is possibly several times cheaper.

  • Real-Time Monitoring of Multicast Group Information

    Achmad BASUKI  Achmad Husni THAMRIN  Hitoshi ASAEDA  Jun MURAI  

     
    PAPER-Information Network

      Vol:
    E93-D No:8
      Page(s):
    2213-2222

    This paper presents a method to monitor information of a large-sized multicast group that can follow the group's dynamics in real-time while avoiding feedback implosion by using probabilistic polling. In particular, this paper improves the probabilistic-polling-based approach by deriving a reference mean value as the reference control value for the number of expected feedback from the properties of a binomial estimation model. As a result, our method adaptively changes its estimation parameters depending on the feedback from receivers in order to achieve a fast estimate time with high accuracy, while preventing the possible occurrence of feedback implosion. Our experimental implementation and evaluation on PlanetLab showed that the proposed method effectively controls the number of feedback and accurately estimates the size of a dynamic multicast group.

  • FOREWORD

    Hiroshi ESAKI  Naoaki YAMANAKA  Hiroyuki OHNO  Atsushi SHIONOZAKI  Yoichi SHINODA  Kenjiro CHO  Kenichi NAGAMI  Suguru YAMAGUCHI  Jun MURAI  Hideo MIYAHARA  

     
    FOREWORD

      Vol:
    E84-B No:8
      Page(s):
    1985-1988
  • Internet Metronome: An Experimental Remote Jazz Jam Session with Uncompressed HDTV Transmission over Lightpaths Open Access

    Osamu NAKAMURA  Kazunori SUGIURA  Seiichi YAMAMOTO  Noriyuki SHIGECHIKA  Akira KATO  Katsuyuki HASEBE  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E89-B No:4
      Page(s):
    1052-1058

    An experimental remote jazz jam session with uncompressed HDTV over the Internet was conducted on September 21st as a Grand Final event of the Aichi Exposition 2005. Professional jazz musicians located at the venue of Aichi Exposition and at SARA in Amsterdam have made the jazz jam session with new mechanisms called as "Internet Metronome" and "delay-control unit" using an international "lightpath." This was the first music collaboration using a new methodology and, one of the challenging demonstrations to transport the uncompressed HDTV streams with timing control under the current software and hardware architectures. "Internet Metronome" and "delay-control unit" enabled to make a tempo using and controlling delay, and "lightpath" minimized the network jitter. Using these new mechanisms and technology, the musicians could play with new music collaboration environment over the Internet with long communication delay, and enjoyed remote jazz jam session at both ends.

  • The IPv6 Software Platform for BSD

    Tatuya JINMEI  Kazuhiko YAMAMOTO  Jun-ichiro itojun HAGINO  Shoichi SAKANE  Hiroshi ESAKI  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E86-B No:2
      Page(s):
    464-471

    IPv6 is designed to solve the exhaustion of the address space, which are one of the biggest problems in the current Internet. The WIDE project has been involved in IPv6 since its early stage, and organized the KAME project in 1998 in order to accelerate its deployment. The KAME project has provided a free, specification-compliant implementation of IPv6 on BSD variants. With its quality and the continuous efforts on it, the implementation has established the position of a reference to IPv6, and has been adopted in BSD variants and in several commercial products. This paper first gives an overview of the IPv6 specifications, including its plug-and-play function, API, DNS, security and transition tools. It then describes the implementation by the KAME project. It is based on the BSD's original network stack, but explores some original enhancements for Neighbor Discovery or IPv6 addressing. Finally, it explains what is missing for the next steps of IPv6, concentrating on plug-and-play and security. The KAME project has joined, and will continue, the standardization and implementation efforts on the new issues.

  • Assessing the Dynamics of Bittorrent Swarms Topologies Using the Peer Exchange Protocol

    Mohamad Dikshie FAUZIE  Achmad Husni THAMRIN  Rodney VAN METER  Jun MURAI  

     
    PAPER

      Vol:
    E95-B No:5
      Page(s):
    1566-1574

    Bittorrent is one of the most popular and successful applications in the current Internet. However, we still have little knowledge about the topology of real Bittorrent swarms, how dynamic the topology is, and how it affects overall behavior. This paper describes an experimental study of the overlay topologies of real-world Bittorrent networks, focusing on the activity of the nodes of its P2P topology and especially their dynamic relationships. Peer Exchange Protocol (PEX) messages are analyzed to infer topologies and their properties, capturing the variations of their behavior. Our measurements, verified using the Kolmogorov-Smirnov goodness of fit test and the likelihood ratio test and confirmed via simulation, show that a power-law with exponential cutoff is a more plausible model than a pure power-law distribution. We also found that the average clustering coefficient is very low, supporting this observation. Bittorrent swarms are far more dynamic than has been recognized previously, potentially impacting attempts to optimize the performance of the system as well as the accuracy of simulations and analyses.

1-20hit(27hit)